Skip to content

Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filters and other blue team tools by making exfiltration data look like legitimate traffic through covert channels

Notifications You must be signed in to change notification settings

3nc0d3r/NaishoDeNusumu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

,   .     o     |         ,--.      ,   .                         
|\  |,---..,---.|---.,---.|   |,---.|\  |.   .,---..   .,-.-..   .
| \ |,---||`---.|   ||   ||   ||---'| \ ||   |`---.|   || | ||   |
`  `'`---^``---'`   '`---'`--' `---'`  `'`---'`---'`---'` ' '`---'
                                                 Stealing Secretly
                    [Copyright (C) 2014, Adam Crompton (@3nc0d3r)]

   ..............,:~~=+++?????+++++~:::,:~~~::,,...............
   ..............,:~~=+++????II????+~:~:,::~~::,,..............
   ...............:~~=+++?????III???+~:~,:~~:::,,..............
   ................,:~=+++??????II???+~:~::~~::,...............
   .......................,:=+???????+=~,:,::..................
   .............................,:~++++=~,.....................
   ........,.............:,,.,:,...,+++=~....:,,...............
   ......................:==:+=,....:??+:..:==:................
   .................................:??+:......................
   .......,........,,,,,...........,+?I?~......................
   ................,:~~:::::::,,:::=?I7I+:,,,,,,,,,............
   ..........,......:=++++++==+++=+?II77?+=~==~~~:,............
   ...........,......~+??IIIIIII??+?I777I+==++++=~:............
   ..................:=??IIIIIII?++?I777I?===+??=~:,....,......
   ...................:+??IIIIII?+=?I777I?~~=+++=~::...........
   .........,..........:=??IIIII?==~+???+~:~====~~:,...........
   .........,...........,=+???????+==~:~~~==+==:~:,............
   ..........,...........,,~==+??????===+?+=+~:,,,.............
   ...........,...........,,::,:~~==~~+=:~~::,,................
   ............,............,,,,,.,..~?~..,,,,,......S1L3NT....
   ..................,........::,..,,=?=::,.,:.................
   ............................,:~:..+??:.,,,..................
   ..............................,~~:=??+:,....................
   .........,.......,...............,+II?,.....................
   ..............,.................,:=II?=.....................
   ,...,,......,.,..,,...........,,,,~III?.....................
   ,.::,,,.......,,.,,,..........,,,,~III?:....................
   :.:::,........,,..,,..........,,:,~IIII=....................
   ~.~~:,.,,.....,,...,........:~~,,,,+?II+,.........,.........
   =.~~:..::,....,,,..,,~=:..:=?I??+==+==?+~........,,.........
   =::~:.,,~,....,:,..,,==:==+IIIIIII?++??+=,.....,............
   ==.:,.,,:,....:,,..,.:~+I7I+~++===+?I?I???+~...:............
   +=,.,..,.:.,.,:,,.,,:~?I?=~+I7IIIII?+==++???:..,............
   ===:..,:.~,..,,,,,.,:+?~+?I777777IIIII??==~=:.,,............
   ===~,.,:,:.,.,.:..,::~~?I77I?+~=++?IIIIIII?=,..,............
   ===~,:,.,,.....:..:~:~?II?=~=+??II??+=+?III?,...............
   ===~:~::,......,..,,,+?+~,+?IIII77IIII+~==++:.,.............
   ===~::::,.,,..,.....~:~~.:+IIIIIIII77III?+?~:..,............
   ~~~~~::,,,~,..,..,..==+.:~+=~===~~=?IIIIIII?~..,............
   :::::,,,::~:,,.......,.....,~=++==~:==?IIII?~..,............
   :,,,,,,:::~,,...............:=++++=~:~+?III?=...............
   ,,..,,,::::,,................~+++++:::+?II??+,..,...........
   _____________________________________________________________

Dependencies:
pyCrypto, Stepic, stegohide, scapy, pexpect

Usage: ./Naisho.py
*Note: Adding any value to argv[1] will not display ui face.

Usage: ./Denusumu.py '<encrypted string>'

Creating RSA Keys: (needs openssl to create the keys)
./keys.sh

Enjoy!! Next version will have alot of new features.

About

Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filters and other blue team tools by making exfiltration data look like legitimate traffic through covert channels

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published